Create policy
Manage columns
Customer managed
Filter policies
Showing 634 results
 
Policy name
Type
Attachments
Used as
Creation time
Edited time
Description
AWS managed
0
None
2019-12-02 09:13 PST
2020-03-02 07:55 PST
Allow Access Analyzer to analyze resource metadata
Job function
4
Permissions policy (4)
2015-02-06 10:39 PST
2015-02-06 10:39 PST
Provides full access to AWS services and resources.
AWS managed
0
None
2017-11-30 08:47 PST
2019-05-20 14:05 PST
Provide device setup access to AlexaForBusiness services
AWS managed
0
None
2017-11-30 08:47 PST
2019-05-20 14:32 PST
Grants full access to AlexaForBusiness resources and access to related AWS Services
AWS managed
0
None
2017-11-30 08:47 PST
2017-11-30 08:47 PST
Provide gateway execution access to AlexaForBusiness services
AWS managed
0
None
2019-03-12 17:53 PST
2019-04-05 14:57 PST
This policy enables Alexa for Business to perform automated tasks scheduled by your network profiles.
AWS managed
0
None
2019-10-16 12:48 PST
2019-10-16 12:48 PST
Provide access to Poly AVS devices
AWS managed
0
None
2017-11-30 08:47 PST
2019-11-19 16:25 PST
Provide read only access to AlexaForBusiness services
AWS managed
0
None
2015-07-09 10:34 PST
2015-07-09 10:34 PST
Provides full access to create/edit/delete APIs in Amazon API Gateway via the AWS Management Console.
AWS managed
0
None
2015-07-09 10:36 PST
2018-12-18 10:25 PST
Provides full access to invoke APIs in Amazon API Gateway.
AWS managed
1
Permissions policy (1)
2015-11-11 15:41 PST
2015-11-11 15:41 PST
Allows API Gateway to push logs to user's account.
AWS managed
0
None
2015-02-06 10:40 PST
2019-08-07 12:27 PST
Provides full access to Amazon AppStream via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2016-12-07 13:00 PST
Provides read only access to Amazon AppStream via the AWS Management Console.
AWS managed
0
None
2016-11-18 20:17 PST
2019-08-07 11:29 PST
Default policy for Amazon AppStream service role.
AWS managed
0
None
2016-11-30 08:46 PST
2019-08-08 10:52 PST
Provide full access to Amazon Athena and scoped access to the dependencies needed to enable querying, writing results, and data management.
AWS managed
0
None
2019-12-03 08:21 PST
2019-12-03 08:21 PST
Provides access to perform all operations Amazon Augmented AI resources, including FlowDefinitions, HumanTaskUis and HumanLoops. Does not allow access for creating FlowDefinitions against the public-crowd Workteam.
AWS managed
0
None
2019-12-03 08:20 PST
2019-12-03 08:20 PST
Provides access to perform all operations on HumanLoops.
AWS managed
0
None
2017-11-01 15:15 PST
2017-11-01 15:15 PST
Provides full access to Amazon Chime Admin Console via the AWS Management Console.
AWS managed
0
None
2017-11-01 15:04 PST
2019-11-18 10:49 PST
Provides read only access to Amazon Chime Admin Console via the AWS Management Console.
AWS managed
0
None
2020-02-04 13:53 PST
2020-02-04 13:53 PST
Provides access to Amazon Chime SDK operations
AWS managed
0
None
2019-09-30 15:25 PST
2019-09-30 15:25 PST
Enables access to AWS Resources used or managed by Amazon Chime
AWS managed
0
None
2017-11-01 15:17 PST
2020-02-18 11:26 PST
Provides user management access to Amazon Chime Admin Console via the AWS Management Console.
AWS managed
0
None
2019-09-30 15:16 PST
2019-09-30 15:16 PST
Managed policy for Service Linked Role for Amazon Chime VoiceConnector
AWS managed
0
None
2017-02-24 16:41 PST
2017-02-24 16:41 PST
Provides full access to Amazon Cloud Directory Service.
AWS managed
0
None
2017-02-28 15:42 PST
2017-02-28 15:42 PST
Provides read only access to Amazon Cloud Directory Service.
AWS managed
0
None
2019-12-03 02:13 PST
2019-12-03 02:13 PST
Provides full access to Amazon CodeGuru Profiler.
AWS managed
0
None
2019-12-03 02:30 PST
2019-12-03 02:30 PST
Provides read only access to Amazon CodeGuru Profiler.
AWS managed
0
None
2019-12-03 00:33 PST
2019-12-03 00:33 PST
Grants full access to Amazon CodeGuru Reviewer and scoped access to required dependencies.
AWS managed
0
None
2019-12-03 00:48 PST
2019-12-03 00:48 PST
Provides read only access to Amazon CodeGuru Reviewer.
AWS managed
0
None
2019-12-02 21:31 PST
2019-12-02 21:31 PST
A service-linked role required for Amazon CodeGuru Reviewer to access resources on your behalf.
AWS managed
0
None
2015-03-24 10:22 PST
2015-03-24 10:22 PST
Provides access to Amazon Cognito APIs to support developer authenticated identities from your authentication backend.
AWS managed
0
None
2019-03-21 14:32 PST
2019-03-21 14:32 PST
Allows Amazon Cognito User Pools service to use your SES identities for email sending
AWS managed
0
None
2015-03-24 10:14 PST
2019-03-29 15:06 PST
Provides administrative access to existing Amazon Cognito resources. You will need AWS account admin privileges to create new Cognito resources.
AWS managed
0
None
2015-03-24 10:06 PST
2019-08-01 12:21 PST
Provides read only access to Amazon Cognito resources.
AWS managed
0
None
2018-10-17 13:59 PST
2018-10-17 15:28 PST
Provides full access to Amazon Connect via the AWS console, and grants permissions to: create and delete AWS Directory Service directories, create S3 buckets, create CloudWatch log groups, create Kinesis streams and firehoses, create and delete service-linked roles, use KMS keys, and get Lex bots
AWS managed
0
None
2018-10-17 14:00 PST
2019-11-06 14:10 PST
Grants permission to view the Amazon Connect instances in your AWS account.
AWS managed
0
None
2018-09-06 17:21 PST
2018-09-25 14:29 PST
Allows Amazon Connect to create and manage AWS resources on your behalf.
AWS managed
0
None
2016-01-07 15:44 PST
2016-01-07 15:44 PST
Provides access to upload DMS replication logs to cloudwatch logs in customer account.
AWS managed
0
None
2016-04-20 10:05 PST
2019-07-08 11:19 PST
Provides access to manage S3 settings for Redshift endpoints for DMS.
AWS managed
0
None
2015-11-18 08:33 PST
2016-05-23 09:29 PST
Provides access to manage VPC settings for AWS managed customer configurations
AWS managed
0
None
2019-01-09 12:37 PST
2019-10-21 11:57 PST
Provides full access to manage Amazon DocumentDB with MongoDB compatibility using the AWS Management Console. Note this policy also grants full access to publish on all SNS topics within the account, permissions to create and edit Amazon EC2 instances and VPC configurations, permissions to view and list keys on Amazon KMS, and full access to Amazon RDS and Amazon Neptune.
AWS managed
0
None
2019-01-09 12:21 PST
2019-01-09 12:21 PST
Provides full access to Amazon DocumentDB with MongoDB compatibility. Note this policy also grants full access to publish on all SNS topics within the account and full access to Amazon RDS and Amazon Neptune.
AWS managed
0
None
2019-01-09 12:30 PST
2019-01-09 12:30 PST
Provides read-only access to Amazon DocumentDB with MongoDB compatibility. Note that this policy also grants access to Amazon RDS and Amazon Neptune resources.
AWS managed
0
None
2015-09-01 17:09 PST
2015-09-01 17:09 PST
Provides access to manage VPC settings for Amazon managed customer configurations
AWS managed
0
None
2015-02-06 10:40 PST
2019-11-25 10:58 PST
Provides full access to Amazon DynamoDB via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2015-11-11 18:17 PST
Provides full access to Amazon DynamoDB including Export/Import using AWS Data Pipeline via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2019-11-25 11:08 PST
Provides read only access to Amazon DynamoDB via the AWS Management Console.
AWS managed
0
None
2015-12-21 09:06 PST
2017-11-10 09:54 PST
Provides administrative access to Amazon ECR resources
AWS managed
0
None
2015-12-21 09:05 PST
2019-12-10 12:48 PST
Provides full access to Amazon EC2 Container Registry repositories, but does not allow repository deletion or policy changes.
AWS managed
0
None
2015-12-21 09:04 PST
2019-12-10 12:56 PST
Provides read-only access to Amazon EC2 Container Registry repositories.
AWS managed
0
None
2016-05-12 16:25 PST
2018-02-05 11:15 PST
Policy to enable Task Autoscaling for Amazon EC2 Container Service
AWS managed
1
Permissions policy (1)
2017-05-30 09:51 PST
2018-05-22 12:13 PST
Policy to enable CloudWatch Events for EC2 Container Service
AWS managed
1
Permissions policy (1)
2015-03-19 11:45 PST
2019-06-13 12:11 PST
Default policy for the Amazon EC2 Role for Amazon EC2 Container Service.
AWS managed
0
None
2015-04-24 09:54 PST
2017-06-07 17:18 PST
Provides administrative access to Amazon ECS resources.
AWS managed
1
Permissions policy (1)
2015-04-09 09:14 PST
2016-08-11 06:08 PST
Default policy for Amazon ECS service role.
AWS managed
0
None
2015-02-06 10:40 PST
2018-11-26 18:16 PST
Provides full access to Amazon EC2 via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to Amazon EC2 via the AWS Management Console.
AWS managed
0
None
2015-05-19 11:10 PST
2017-03-20 10:14 PST
Provides EC2 access to S3 bucket to download revision. This role is needed by the CodeDeploy agent on EC2 instances.
AWS managed
0
None
2015-02-06 10:41 PST
2016-02-22 09:24 PST
Default policy for the Amazon EC2 Role for Data Pipeline service role.
AWS managed
0
None
2015-05-29 10:48 PST
2019-01-24 11:20 PST
This policy will soon be deprecated. Please use AmazonSSMManagedInstanceCore policy to enable AWS Systems Manager service core functionality on EC2 instances. For more information see https://docs.aws.amazon.com/systems-manager/latest/userguide/setup-instance-profile.html
AWS managed
0
None
2019-11-13 00:05 PST
2019-11-24 13:48 PST
Managed policy for the Amazon LaunchWizard service role for EC2
AWS managed
0
None
2016-08-19 11:27 PST
2019-02-18 11:17 PST
Policy to enable Autoscaling for Amazon EC2 Spot Fleet
AWS managed
1
Permissions policy (1)
2015-05-18 16:28 PST
2017-11-07 11:14 PST
AWS managed
1
Permissions policy (1)
2017-06-29 11:19 PST
2017-11-17 14:51 PST
Allows EC2 Spot Fleet to request, terminate and tag Spot Instances on your behalf.
AWS managed
0
None
2017-11-07 13:36 PST
2019-06-20 10:53 PST
Provides administrative access to Amazon ECS resources and enables ECS features through access to other AWS service resources, including VPCs, Auto Scaling groups, and CloudFormation stacks.
AWS managed
1
Permissions policy (1)
2017-10-13 18:18 PST
2019-11-21 11:49 PST
Policy to enable Amazon ECS to manage your cluster.
AWS managed
1
Permissions policy (1)
2017-11-16 10:48 PST
2017-11-16 10:48 PST
Provides access to other AWS service resources that are required to run Amazon ECS tasks
AWS managed
0
None
2018-05-27 14:07 PST
2019-06-27 11:10 PST
This policy provides the Amazon VPC CNI Plugin (amazon-vpc-cni-k8s) the permissions it requires to modify the IP address configuration on your EKS worker nodes. This permission set allows the CNI to list, describe, and modify Elastic Network Interfaces on your behalf. More information on the AWS VPC CNI Plugin is available here: https://github.com/aws/amazon-vpc-cni-k8s
AWS managed
0
None
2018-05-27 14:06 PST
2020-02-21 12:10 PST
This policy provides Kubernetes the permissions it requires to manage resources on your behalf. Kubernetes requires Ec2:CreateTags permissions to place identifying information on EC2 resources including but not limited to Instances, Security Groups, and Elastic Network Interfaces.
AWS managed
0
None
2019-11-21 20:34 PST
2019-11-21 20:34 PST
Provides access to other AWS service resources that are required to run Amazon EKS pods on AWS Fargate
AWS managed
0
None
2019-11-21 20:36 PST
2019-11-21 20:36 PST
This policy grants necessary permissions to Amazon EKS to run fargate tasks
AWS managed
0
None
2018-05-27 14:08 PST
2019-08-21 09:17 PST
This policy allows Amazon Elastic Container Service for Kubernetes to create and manage the necessary resources to operate EKS Clusters.
AWS managed
0
None
2020-02-21 12:10 PST
2020-02-21 12:10 PST
A Service-Linked Role required for Amazon EKS to call AWS services on your behalf.
AWS managed
0
None
2018-05-27 14:09 PST
2018-05-27 14:09 PST
This policy allows Amazon EKS worker nodes to connect to Amazon EKS Clusters.
AWS managed
0
None
2015-02-06 10:40 PST
2017-12-07 09:48 PST
Provides full access to Amazon ElastiCache via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to Amazon ElastiCache via the AWS Management Console.
AWS managed
0
None
2020-01-13 08:27 PST
2020-01-13 08:27 PST
Provides root client access to an Amazon EFS file system
AWS managed
0
None
2020-01-13 08:24 PST
2020-01-13 08:24 PST
Provides read only client access to an Amazon EFS file system
AWS managed
0
None
2020-01-13 08:21 PST
2020-01-13 08:21 PST
Provides read and write client access to an Amazon EFS file system
AWS managed
0
None
2015-05-27 09:22 PST
2020-01-13 08:15 PST
Provides full access to Amazon EFS via the AWS Management Console.
AWS managed
0
None
2015-05-27 09:25 PST
2020-01-13 08:16 PST
Provides read only access to Amazon EFS via the AWS Management Console.
AWS managed
0
None
2019-11-05 08:52 PST
2019-11-05 08:52 PST
Allows Amazon Elastic File System to manage AWS resources on your behalf
AWS managed
0
None
2018-11-16 13:55 PST
2018-11-16 13:55 PST
Default policy for the Amazon Elastic MapReduce Editors service role.
AWS managed
0
None
2016-11-17 17:09 PST
2016-11-17 17:09 PST
Amazon Elastic MapReduce for Auto Scaling. Role to allow Auto Scaling to add and remove instances from your EMR cluster.
AWS managed
0
None
2015-02-06 10:41 PST
2017-08-11 16:57 PST
Default policy for the Amazon Elastic MapReduce for EC2 service role.
AWS managed
0
None
2015-02-06 10:40 PST
2019-10-11 08:19 PST
Provides full access to Amazon Elastic MapReduce and underlying services that it requires such as EC2 and S3
AWS managed
0
None
2015-02-06 10:40 PST
2017-05-22 16:00 PST
Provides read only access to Amazon Elastic MapReduce via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2017-12-11 16:47 PST
Default policy for the Amazon Elastic MapReduce service role.
AWS managed
0
None
2017-07-06 17:15 PST
2018-02-08 13:38 PST
Allow Amazon Elasticsearch Service to access other AWS services such as EC2 Networking APIs on your behalf.
AWS managed
0
None
2018-04-27 11:59 PST
2019-06-10 15:51 PST
Grants users full access to Elastic Transcoder and the access to associated services that is required for full Elastic Transcoder functionality.
AWS managed
0
None
2018-06-07 14:12 PST
2019-06-10 15:49 PST
Grants users permission to change presets, submit jobs, and view Elastic Transcoder settings. This policy also grants some read-only access to some other services required to use the Elastic Transcode console, including S3, IAM, and SNS.
AWS managed
0
None
2018-06-07 14:09 PST
2019-06-10 15:48 PST
Grants users read-only access to Elastic Transcoder and list access to related services.
AWS managed
0
None
2015-02-06 10:41 PST
2019-06-13 15:48 PST
Default policy for the Amazon Elastic Transcoder service role.
AWS managed
0
None
2017-09-26 16:54 PST
2017-09-26 16:54 PST
Allows the actions that EMR requires to terminate and delete AWS EC2 resources if the EMR Service role has lost that ability.
AWS managed
0
None
2018-02-28 14:29 PST
2018-02-28 14:29 PST
Provides limited access to the Amazon Cognito configuration service.
AWS managed
0
None
2015-10-01 12:14 PST
2015-10-01 12:14 PST
Provides full access to the Amazon ES configuration service.
AWS managed
0
None
2015-10-01 12:18 PST
2018-10-02 20:32 PST
Provides read-only access to the Amazon ES configuration service.
AWS managed
0
None
2019-07-11 07:08 PST
2019-07-11 07:08 PST
Provides full access to Amazon EventBridge.
AWS managed
0
None
2019-07-11 06:59 PST
2019-07-11 06:59 PST
Provides read only access to Amazon EventBridge.
AWS managed
0
None
2019-11-28 15:12 PST
2019-11-28 15:12 PST
Provides full access to Amazon EventBridge Schemas.
AWS managed
0
None
2019-11-28 15:05 PST
2019-11-28 15:05 PST
Provides read only access to Amazon EventBridge Schemas.
AWS managed
0
None
2019-11-26 17:10 PST
2019-11-26 17:10 PST
AWS managed
0
None
2019-01-17 17:52 PST
2019-01-17 17:52 PST
Gives access to all actions for Amazon Forecast
AWS managed
0
None
2019-12-03 14:46 PST
2019-12-03 14:46 PST
Gives access to all actions for Amazon Fraud Detector
AWS managed
0
None
2017-11-29 07:32 PST
2017-11-29 07:32 PST
Full Access Policy for Amazon FreeRTOS
AWS managed
0
None
2018-08-27 15:43 PST
2019-10-07 13:11 PST
Allows user to access Amazon FreeRTOS OTA Update
AWS managed
0
None
2018-11-28 08:36 PST
2020-01-21 08:42 PST
Provides full access to Amazon FSx and access to related AWS services via the AWS Management Console.
AWS managed
0
None
2018-11-28 08:35 PST
2019-09-10 06:17 PST
Provides read only access to Amazon FSx and access to related AWS services via the AWS Management Console.
AWS managed
0
None
2018-11-28 08:34 PST
2018-11-28 08:34 PST
Provides full access to Amazon FSx and access to related AWS services.
AWS managed
0
None
2018-11-28 08:33 PST
2018-11-28 08:33 PST
Provides read only access to Amazon FSx.
AWS managed
0
None
2018-11-28 02:38 PST
2019-06-18 06:25 PST
Allows Amazon FSx to manage AWS resources on your behalf
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to Amazon Glacier via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2016-05-05 11:46 PST
Provides read only access to Amazon Glacier via the AWS Management Console.
AWS managed
0
None
2017-11-28 14:31 PST
2017-11-28 14:31 PST
Provides full access to use Amazon GuardDuty.
AWS managed
0
None
2017-11-28 14:29 PST
2018-04-25 14:07 PST
Provides read only access to Amazon GuardDuty resources
AWS managed
1
Permissions policy (1)
2017-11-28 12:12 PST
2017-11-28 12:12 PST
Enable access to AWS Resources used or managed by Amazon Guard Duty
AWS managed
0
None
2015-10-07 10:08 PST
2017-12-21 06:53 PST
Provides full access to Amazon Inspector.
AWS managed
0
None
2015-10-07 10:08 PST
2019-10-01 08:17 PST
Provides read only access to Amazon Inspector.
AWS managed
0
None
2017-11-21 07:48 PST
2018-05-10 11:36 PST
Grants Amazon Inspector access to AWS Services needed to perform security assessments
AWS managed
0
None
2019-12-03 08:15 PST
2019-12-03 08:15 PST
Provides full access to Amazon Kendra via the AWS Management Console.
AWS managed
0
None
2019-12-03 08:13 PST
2019-12-03 08:13 PST
Provides read only access to Amazon Kendra via the AWS Management Console.
AWS managed
0
None
2016-09-21 12:01 PST
2016-09-21 12:01 PST
Provides full access to Amazon Kinesis Analytics via the AWS Management Console.
AWS managed
0
None
2016-09-21 11:16 PST
2016-09-21 11:16 PST
Provides read-only access to Amazon Kinesis Analytics via the AWS Management Console.
AWS managed
0
None
2015-10-07 11:45 PST
2015-10-07 11:45 PST
Provides full access to all Amazon Kinesis Firehose Delivery Streams.
AWS managed
0
None
2015-10-07 11:43 PST
2015-10-07 11:43 PST
Provides read only access to all Amazon Kinesis Firehose Delivery Streams.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to all streams via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to all streams via the AWS Management Console.
AWS managed
0
None
2017-12-01 15:27 PST
2017-12-01 15:27 PST
Provides full access to Amazon Kinesis Video Streams via the AWS Management Console.
AWS managed
0
None
2017-12-01 15:14 PST
2017-12-01 15:14 PST
Provides read only access to AWS Kinesis Video Streams via the AWS Management Console.
AWS managed
0
None
2019-11-13 09:08 PST
2019-11-24 13:55 PST
Provides full access to LaunchWizard via the AWS console, and grants permissions to create and delete EC2 instances / VPCs / Subnets / CloudWatch logs with a specific tag key, create and delete Managed Active Directory, read Service quota information, push SNS notifications, create and delete Systems Manager automations, invoke SSM run commands, create and delete CloudFormation stacks, IAM role related permissions with a specific role prefix. In future, the policy may be updated to allow for creating / deletion / describe / listing of additional resource types based on the application scenario(s) the service is going to support.
AWS managed
0
None
2017-04-11 16:20 PST
2017-11-15 15:55 PST
Provides full access to Amazon Lex via the AWS Management Console. Also provides access to create Lex Service Linked Roles and grant Lex permissions to invoke a limited set of Lambda functions.
AWS managed
0
None
2017-04-11 16:13 PST
2017-04-11 16:13 PST
Provides read-only access to Amazon Lex.
AWS managed
0
None
2017-04-11 16:06 PST
2017-04-11 16:06 PST
Provides access to Amazon Lex conversational APIs.
AWS managed
0
None
2015-04-09 10:12 PST
2015-04-09 10:12 PST
Grants users permission to request Amazon Machine Learning batch predictions.
AWS managed
0
None
2015-04-09 10:18 PST
2016-06-29 13:55 PST
Provides create access for non-prediction Amazon Machine Learning resources.
AWS managed
0
None
2015-04-09 10:25 PST
2015-04-09 10:25 PST
Provides full access to Amazon Machine Learning resources.
AWS managed
0
None
2015-04-09 10:32 PST
2015-04-09 10:32 PST
Grants users permission to create and delete the real-time endpoint for Amazon Machine Learning models.
AWS managed
0
None
2015-04-09 10:40 PST
2015-04-09 10:40 PST
Provides read only access to Amazon Machine Learning resources.
AWS managed
0
None
2015-04-09 10:44 PST
2015-04-09 10:44 PST
Grants users permission to request Amazon Machine Learning real-time predictions.
AWS managed
0
None
2019-06-10 17:01 PST
2019-06-10 17:01 PST
Allows Machine Learning to configure and use your Redshift Clusters and S3 Staging Locations for Redshift Data Source.
AWS managed
0
None
2017-08-14 07:54 PST
2018-06-28 08:54 PST
Provides full access to Amazon Macie.
AWS managed
0
None
2018-06-28 08:46 PST
2018-06-28 08:46 PST
Grants permission to create the service-linked role of Amazon Macie.
AWS managed
0
None
2017-08-14 07:53 PST
2017-08-14 07:53 PST
Grants Macie read-only access to resource dependencies in your account in order to enable data analysis.
AWS managed
0
None
2018-06-19 15:17 PST
2019-09-27 14:50 PST
Service linked role for Amazon Macie
AWS managed
0
None
2017-08-14 07:53 PST
2019-09-27 11:41 PST
Provides Macie with access to your AWS account.
AWS managed
0
None
2019-04-29 14:23 PST
2019-04-29 14:23 PST
Provides full access to Amazon Managed Blockchain via the AWS Management Console
AWS managed
0
None
2019-04-29 14:39 PST
2019-04-29 14:39 PST
Provides full access to Amazon Managed Blockchain.
AWS managed
0
None
2019-04-30 11:17 PST
2019-04-30 11:17 PST
Provides read-only access to Amazon Managed Blockchain.
AWS managed
0
None
2020-01-17 11:51 PST
2020-01-17 11:51 PST
Enables access to AWS Services and Resources used or managed by Amazon Managed Blockchain
AWS managed
0
None
2019-12-03 05:45 PST
2019-12-03 05:45 PST
Provide full access to Amazon Managed Apache Cassandra Service
AWS managed
0
None
2019-12-03 05:46 PST
2019-12-03 05:46 PST
Provide read only access to Amazon Managed Apache Cassandra Service
AWS managed
0
None
2015-12-11 11:08 PST
2015-12-11 11:08 PST
Provides full access to all APIs in Amazon Mechanical Turk.
AWS managed
0
None
2015-12-11 11:08 PST
2019-09-25 14:06 PST
Provides access to read only APIs in Amazon Mechanical Turk.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to all reports including financial data for all application resources.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to all application resources.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to non financial reports for all application resources.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides write only access to put event data for all application resources. (Recommended for SDK integration)
AWS managed
0
None
2018-12-18 12:31 PST
2018-12-18 12:31 PST
Provides full access to AmazonMQ via our API/SDK.
AWS managed
0
None
2018-12-18 12:31 PST
2018-12-18 12:31 PST
Provides read only access to AmazonMQ via our API/SDK.
AWS managed
0
None
2017-11-28 07:28 PST
2018-12-18 12:33 PST
Provides full access to AmazonMQ via the AWS Management Console.
AWS managed
0
None
2017-11-28 07:30 PST
2017-11-28 11:02 PST
Provides read only access to AmazonMQ via the AWS Management Console.
AWS managed
0
None
2019-01-14 14:07 PST
2020-02-27 17:16 PST
Provide full access to Amazon MSK and other required permissions for its dependencies.
AWS managed
0
None
2019-01-14 14:28 PST
2019-01-14 14:28 PST
Provide readonly access to Amazon MSK
AWS managed
0
None
2018-12-04 14:24 PST
2019-05-30 16:46 PST
Provides full access to Amazon Personalize via the AWS Management Console and SDK. Also provides select access to related services (e.g., S3, CloudWatch).
AWS managed
0
None
2016-11-30 10:59 PST
2016-11-30 10:59 PST
Grants full access to Amazon Polly service and resources.
AWS managed
0
None
2016-11-30 10:59 PST
2018-07-17 09:41 PST
Grants read-only access to Amazon Polly resources.
AWS managed
0
None
2019-09-05 11:24 PST
2019-09-05 11:24 PST
Provides full access to Amazon QLDB via the AWS Management Console.
AWS managed
0
None
2019-09-05 11:23 PST
2019-09-05 11:23 PST
Provides full access to Amazon QLDB via the service API.
AWS managed
0
None
2019-09-05 11:19 PST
2019-09-05 11:19 PST
Provides read only access to Amazon QLDB.
AWS managed
0
None
2018-05-02 12:41 PST
2018-07-05 11:29 PST
Allows Amazon RDS to manage AWS resources on your behalf.
AWS managed
0
None
2018-11-20 13:29 PST
2019-11-20 13:58 PST
Allows full access to use the RDS data APIs, secret store APIs for RDS database credentials, and DB console query management APIs to execute SQL statements on Aurora Serverless clusters in the AWS account.
AWS managed
0
None
2016-02-25 18:02 PST
2019-05-15 09:51 PST
Allow RDS to access Directory Service Managed AD on behalf of the customer for domain-joined SQL Server DB instances.
AWS managed
1
Permissions policy (1)
2015-11-11 11:58 PST
2015-11-11 11:58 PST
Provides access to Cloudwatch for RDS Enhanced Monitoring
AWS managed
0
None
2015-02-06 10:40 PST
2018-04-09 10:42 PST
Provides full access to Amazon RDS via the AWS Management Console.
AWS managed
0
None
2018-05-31 11:02 PST
2018-05-31 11:02 PST
Amazon RDS Preview Service Role Policy
AWS managed
0
None
2015-02-06 10:40 PST
2017-08-28 14:36 PST
Provides read only access to Amazon RDS via the AWS Management Console.
AWS managed
1
Permissions policy (1)
2018-01-08 10:17 PST
2019-04-16 13:12 PST
Allows Amazon RDS to manage AWS resources on your behalf.
AWS managed
0
None
2015-02-06 10:40 PST
2019-08-05 17:05 PST
Provides full access to Amazon Redshift via the AWS Management Console.
AWS managed
0
None
2018-10-04 15:50 PST
2018-10-04 15:50 PST
Provides full access to the Amazon Redshift Query Editor and to saved queries via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to Amazon Redshift via the AWS Management Console.
AWS managed
0
None
2017-09-18 12:19 PST
2017-09-25 14:20 PST
Allows Amazon Redshift to call AWS services on your behalf
AWS managed
0
None
2020-01-08 11:18 PST
2020-01-08 11:18 PST
This policy specifies rekognition and s3 permissions required by Amazon Rekognition Custom Labels feature.
AWS managed
0
None
2016-11-30 06:40 PST
2016-11-30 06:40 PST
Access to all Amazon Rekognition APIs
AWS managed
0
None
2016-11-30 06:58 PST
2020-02-20 13:26 PST
Access to all Read rekognition APIs
AWS managed
0
None
2017-11-29 08:52 PST
2017-11-29 08:52 PST
Allows Rekognition to call AWS services on your behalf.
AWS managed
0
None
2018-01-18 10:40 PST
2018-01-18 10:40 PST
Provides full access to all Route 53 Auto Naming actions.
AWS managed
0
None
2018-01-17 19:02 PST
2018-01-17 19:02 PST
Provides read-only access to all Route 53 Auto Naming actions.
AWS managed
0
None
2018-03-12 15:33 PST
2018-03-12 15:33 PST
Provides registrant level access to Route 53 Auto Naming actions.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to all Route53 Domains actions and Create Hosted Zone to allow Hosted Zone creation as part of domain registrations.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides access to Route53 Domains list and actions.
AWS managed
0
None
2015-02-06 10:40 PST
2018-12-20 13:42 PST
Provides full access to all Amazon Route 53 via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2016-11-15 13:15 PST
Provides read only access to all Amazon Route 53 via the AWS Management Console.
AWS managed
0
None
2019-05-30 11:10 PST
2019-05-30 11:10 PST
Full access policy for Route 53 Resolver
AWS managed
0
None
2019-05-30 11:11 PST
2019-09-27 09:37 PST
Read only policy for Route 53 Resolver
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to all buckets via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to all buckets via the AWS Management Console.
AWS managed
0
None
2017-11-29 05:07 PST
2020-01-13 12:47 PST
Provides full access to Amazon SageMaker via the AWS Management Console and SDK. Also provides select access to related services (e.g., S3, ECR, CloudWatch Logs).
AWS managed
0
None
2019-12-03 08:19 PST
2019-12-03 08:19 PST
Provides access to create Amazon Augmented AI FlowDefinition resources against any Workteam.
AWS managed
0
None
2019-10-18 13:27 PST
2019-11-26 10:58 PST
Managed policy for Service Linked Role for Amazon SageMaker Notebooks
AWS managed
0
None
2017-11-29 05:07 PST
2019-12-03 08:40 PST
Provides read only access to Amazon SageMaker via the AWS Management Console and SDK.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides full access to Amazon SES via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides read only access to Amazon SES via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides full access to Amazon SNS via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides read only access to Amazon SNS via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Default policy for Amazon SNS service role.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides full access to Amazon SQS via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2018-08-20 16:35 PST
Provides read only access to Amazon SQS via the AWS Management Console.
AWS managed
0
None
2017-08-07 16:07 PST
2017-08-07 16:07 PST
Provides access to view automation executions and send approval decisions to automation waiting for approval
AWS managed
0
None
2016-12-05 14:09 PST
2017-07-24 16:29 PST
Provides permissions for EC2 Automation service to execute activities defined within Automation documents
AWS managed
0
None
2019-03-15 10:44 PST
2019-03-15 10:44 PST
This policy allows SSM Agent to access Directory Service on behalf of the customer for domain-join the managed instance.
AWS managed
0
None
2015-05-29 10:39 PST
2019-11-20 12:08 PST
Provides full access to Amazon SSM.
AWS managed
0
None
2016-12-01 07:57 PST
2019-07-26 17:16 PST
Service Role to be used for EC2 Maintenance Window
AWS managed
0
None
2019-03-15 10:22 PST
2019-05-23 09:54 PST
The policy for Amazon EC2 Role to enable AWS Systems Manager service core functionality.
AWS managed
0
None
2015-05-29 10:44 PST
2015-05-29 10:44 PST
Provides read only access to Amazon SSM.
AWS managed
0
None
2017-11-13 11:20 PST
2020-01-22 13:46 PST
Provides access to AWS Resources managed or used by Amazon SSM
AWS managed
0
None
2018-04-24 13:14 PST
2018-04-24 13:14 PST
Provides full access to Amazon Sumerian.
AWS managed
0
None
2018-11-28 11:07 PST
2018-11-28 11:07 PST
Access to all Amazon Textract APIs
AWS managed
0
None
2018-11-28 11:12 PST
2018-11-28 11:12 PST
Allows Textract to call AWS services on your behalf.
AWS managed
0
None
2018-04-04 09:06 PST
2018-04-04 09:06 PST
Provides full access to Amazon Transcribe operations
AWS managed
0
None
2018-04-04 09:05 PST
2018-04-04 09:05 PST
Provides access to read only operation for Amazon Transcribe
AWS managed
0
None
2017-07-18 13:47 PST
2019-01-07 11:16 PST
Provides access to create network interfaces and attach them to cross-account resources
AWS managed
0
None
2015-02-06 10:41 PST
2018-03-15 11:30 PST
Provides full access to Amazon VPC via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2018-03-07 10:34 PST
Provides read only access to Amazon VPC via the AWS Management Console.
AWS managed
0
None
2020-01-08 15:49 PST
2020-01-08 15:49 PST
Provides read only access to Amazon WorkDocs via the AWS Management Console
AWS managed
0
None
2019-01-23 10:52 PST
2019-09-23 11:37 PST
Grants full access to Amazon WorkLink resources
AWS managed
0
None
2019-01-23 11:07 PST
2019-09-23 11:37 PST
Grants read only access to Amazon WorkLink resources
AWS managed
0
None
2019-03-18 11:00 PST
2020-02-07 12:48 PST
Enables access to AWS Services and Resources used or managed by Amazon WorkLink
AWS managed
0
None
2019-04-16 09:52 PST
2019-04-16 09:52 PST
Enables access to AWS Services and Resources used or managed by Amazon WorkMail Events
AWS managed
0
None
2015-02-06 10:40 PST
2019-12-09 03:52 PST
Provides full access to WorkMail, Directory Service, SES, EC2 and read access to KMS metadata.
AWS managed
0
None
2015-02-06 10:40 PST
2019-07-25 01:24 PST
Provides read only access to WorkMail and SES.
AWS managed
0
None
2015-09-22 15:21 PST
2016-08-18 16:08 PST
Provides access to Amazon WorkSpaces administrative actions via AWS SDK and CLI.
AWS managed
0
None
2015-04-09 07:03 PST
2015-04-09 07:03 PST
Provides administrator access for packaging an application in Amazon WorkSpaces Application Manager.
AWS managed
0
None
2019-06-27 12:22 PST
2019-06-27 12:22 PST
Provides access to Amazon WorkSpaces backend service to perform Workspace Self Service actions
AWS managed
0
None
2019-06-27 12:19 PST
2019-06-27 12:19 PST
Provides customer account access to AWS WorkSpaces service for launching a Workspace.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides full access to Amazon Zocalo.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides read only access to Amazon Zocalo
AWS managed
0
None
2017-10-20 10:23 PST
2020-02-25 12:24 PST
Allows API Gateway to manage associated AWS Resources on behalf of the customer.
AWS managed
0
None
2017-02-06 13:39 PST
2017-02-06 13:39 PST
Policy to enable Application Autoscaling for Amazon AppStream
AWS managed
0
None
2018-08-09 13:22 PST
2018-08-13 15:31 PST
Enables access to AWS Services and Resources used or managed by Application Discovery Service Continuous Export feature
AWS managed
0
None
2017-01-12 11:43 PST
2018-02-06 15:15 PST
Provides full access to Auto Scaling via the AWS Management Console.
AWS managed
0
None
2017-01-12 11:48 PST
2017-01-12 11:48 PST
Provides read-only access to Auto Scaling via the AWS Management Console.
AWS managed
0
None
2017-01-12 11:31 PST
2018-02-06 13:59 PST
Provides full access to Auto Scaling.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Default policy for the AutoScaling Notification Access service role.
AWS managed
0
None
2017-01-12 11:39 PST
2017-01-12 11:39 PST
Provides read-only access to Auto Scaling.
AWS managed
0
None
2018-01-08 15:10 PST
2018-10-31 11:19 PST
Enables access to AWS Services and Resources used or managed by Auto Scaling
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Allows users to access the Account Activity page.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Allows users to access the Account Usage Report page.
AWS managed
0
None
2016-08-01 18:35 PST
2020-02-24 15:08 PST
Provides access for the Discovery Agentless Connector to register with AWS Application Discovery Service.
AWS managed
0
None
2017-10-20 12:04 PST
2017-10-20 12:04 PST
Policy granting permissions to Application Auto Scaling to access AppStream and CloudWatch.
AWS managed
0
None
2019-11-14 10:39 PST
2019-11-14 10:39 PST
Policy granting permissions to Application Auto Scaling to access Comprehend and CloudWatch.
AWS managed
0
None
2018-06-04 16:22 PST
2018-06-04 16:22 PST
Policy granting permissions to Application Auto Scaling to access APIGateway and CloudWatch for custom resource scaling
AWS managed
0
None
2017-10-20 14:34 PST
2017-10-20 14:34 PST
Policy granting permissions to Application Auto Scaling to access DynamoDB and CloudWatch.
AWS managed
0
None
2017-10-25 11:23 PST
2017-10-25 11:23 PST
Policy granting permissions to Application Auto Scaling to access EC2 Spot Fleet and CloudWatch.
AWS managed
0
None
2017-10-25 16:53 PST
2017-10-25 16:53 PST
Policy granting permissions to Application Auto Scaling to access EC2 Container Service and CloudWatch.
AWS managed
0
None
2017-10-25 17:57 PST
2017-10-25 17:57 PST
Policy granting permissions to Application Auto Scaling to access Elastic Map Reduce and CloudWatch.
AWS managed
0
None
2019-10-21 13:04 PST
2019-10-21 13:04 PST
Policy granting permissions to Application Auto Scaling to access Lambda and CloudWatch.
AWS managed
0
None
2017-10-17 10:46 PST
2018-08-07 12:14 PST
Policy granting permissions to Application Auto Scaling to access RDS and CloudWatch.
AWS managed
0
None
2018-02-06 11:58 PST
2018-02-06 11:58 PST
Policy granting permissions to Application Auto Scaling to access SageMaker and CloudWatch.
AWS managed
0
None
2016-05-11 14:38 PST
2020-02-24 14:26 PST
Provides access for the Discovery Agent to register with AWS Application Discovery Service.
AWS managed
0
None
2016-05-11 14:30 PST
2019-06-19 14:21 PST
Provides full access to view and tag Configuration Items maintained by the AWS Application Discovery Service
AWS managed
0
None
2019-07-03 14:29 PST
2019-07-03 14:29 PST
App Mesh Envoy policy for accessing Virtual Node configuration.
AWS managed
0
None
2019-04-16 10:50 PST
2019-10-03 15:28 PST
Provides full access to the AWS App Mesh APIs and Management Console.
AWS managed
0
None
2019-08-05 16:32 PST
2019-08-05 16:32 PST
App Mesh Preview Envoy policy for accessing Virtual Node configuration.
AWS managed
0
None
2019-06-19 12:07 PST
2019-08-21 14:06 PST
Enables access to AWS Services and Resources used or managed by AWS App Mesh
AWS managed
0
None
2019-04-16 10:51 PST
2019-10-03 15:25 PST
Provides read-only access to the AWS App Mesh APIs and Management Console.
AWS managed
0
None
2019-06-03 11:30 PST
2019-09-10 15:44 PST
Enables access to AWS Services and Resources used or managed by AWS AppMesh
AWS managed
0
None
2018-03-20 14:20 PST
2019-11-04 11:23 PST
Provides administrative access to the AppSync service, though not enough to access via the console.
AWS managed
0
None
2018-03-20 14:21 PST
2018-03-20 14:21 PST
Provides full invoking access to the AppSync service - both through the console and independently
AWS managed
0
None
2018-04-09 12:38 PST
2018-04-09 12:38 PST
Allows AppSync to push logs to user's CloudWatch account.
AWS managed
0
None
2018-03-20 14:21 PST
2018-03-20 14:21 PST
Provides access to create, update, and query the schema.
AWS managed
0
None
2020-01-21 11:56 PST
2020-01-21 11:56 PST
Enables access to AWS services and resources used or managed by AppSync
AWS managed
0
None
2018-04-10 16:04 PST
2018-04-10 16:04 PST
Allows AWS Artifact read-only access to operations in AWS Organizations.
AWS managed
0
None
2018-08-23 15:46 PST
2018-08-23 15:46 PST
Policy granting permissions to AWS Auto Scaling to periodically forecast capacity and generate scheduled scaling actions for Auto Scaling groups in a scaling plan
AWS managed
0
None
2018-12-13 10:48 PST
2018-12-13 10:48 PST
RoboMaker service policy for internal SLR
AWS managed
0
None
2019-11-18 14:21 PST
2020-01-13 10:40 PST
This policy is for backup administrators, granting full access to AWS Backup operations, including creating or editing backup plans, assigning AWS resources to backup plans, deleting backups, and restoring backups.
AWS managed
0
None
2019-11-18 14:23 PST
2020-01-13 08:15 PST
This policy grants users permissions to assign AWS resources to backup plans, create on-demand backups, and restore backups. This policy does not allow the user to create or edit backup plans or to delete scheduled backups after they are created.
AWS managed
0
None
2019-01-10 13:01 PST
2020-01-13 08:02 PST
Provides AWS Backup permission to create backups on your behalf across AWS services
AWS managed
0
None
2019-01-11 16:23 PST
2020-01-13 08:04 PST
Provides AWS Backup permission to perform restores on your behalf across AWS services. This policy includes permissions to create and delete AWS resources, such as EBS volumes, RDS instances, and EFS file systems, which are part of the restore process.
AWS managed
0
None
2016-12-06 11:35 PST
2018-11-05 13:09 PST
Provides full access for AWS Batch resources.
AWS managed
0
None
2018-02-28 14:31 PST
2018-02-28 14:31 PST
Policy to enable CloudWatch Event Target for AWS Batch Job Submission
AWS managed
0
None
2016-12-06 11:36 PST
2019-10-08 12:31 PST
Policy for AWS Batch service role which allows access to related services including EC2, Autoscaling, EC2 Container service and Cloudwatch Logs.
AWS managed
0
None
2016-01-21 09:02 PST
2016-01-21 09:02 PST
Provides full access to AWS Certificate Manager (ACM)
AWS managed
0
None
2018-10-23 09:51 PST
2019-03-14 10:17 PST
Provides auditor access to AWS Certificate Manager Private Certificate Authority
AWS managed
0
None
2018-10-23 09:54 PST
2018-10-23 09:54 PST
Provides full access to AWS Certificate Manager Private Certificate Authority
AWS managed
0
None
2019-06-20 10:43 PST
2019-06-20 10:43 PST
Provides privileged certificate user access to AWS Certificate Manager Private Certificate Authority
AWS managed
0
None
2018-10-23 09:57 PST
2019-03-14 10:17 PST
Provides read only access to AWS Certificate Manager Private Certificate Authority
AWS managed
0
None
2018-10-23 09:53 PST
2019-06-20 10:42 PST
Provides certificate user access to AWS Certificate Manager Private Certificate Authority
AWS managed
0
None
2016-01-21 09:07 PST
2016-04-21 08:08 PST
Provides read only access to AWS Certificate Manager (ACM).
AWS managed
0
None
2019-11-18 08:39 PST
2019-11-18 08:39 PST
The Service Linked Role used by AWS Chatbot.
AWS managed
0
None
2017-11-30 08:17 PST
2017-11-30 08:17 PST
Provides administrator access to AWS Cloud9.
AWS managed
0
None
2017-11-30 08:18 PST
2017-11-30 08:18 PST
Provides the ability to be invited into AWS Cloud9 shared development environments.
AWS managed
0
None
2017-11-30 05:44 PST
2020-01-08 04:35 PST
Service Linked Role Policy for AWS Cloud9
AWS managed
0
None
2017-11-30 08:16 PST
2018-07-02 01:46 PST
Provides permission to create AWS Cloud9 development environments and to manage owned environments.
AWS managed
0
None
2019-07-26 14:50 PST
2019-07-26 14:50 PST
Provides full access to AWS CloudFormation.
AWS managed
0
None
2015-02-06 10:39 PST
2019-11-13 09:40 PST
Provides access to AWS CloudFormation via the AWS Management Console.
AWS managed
0
None
2018-06-12 13:15 PST
2019-11-22 11:33 PST
Grants CloudFront Logger write permissions to CloudWatch Logs.
AWS managed
0
None
2015-02-06 10:39 PST
2015-02-06 10:39 PST
Provides full access to all CloudHSM resources.
AWS managed
0
None
2015-02-06 10:39 PST
2015-02-06 10:39 PST
Provides read only access to all CloudHSM resources.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Default policy for the AWS CloudHSM service role.
AWS managed
0
None
2018-11-28 16:02 PST
2018-11-28 16:02 PST
Provides access to AWS Cloud Map discovery API.
AWS managed
0
None
2018-11-28 15:57 PST
2018-11-28 15:57 PST
Provides full access to all AWS Cloud Map actions.
AWS managed
0
None
2018-11-28 15:45 PST
2018-11-28 15:45 PST
Provides read-only access to all AWS Cloud Map actions.
AWS managed
0
None
2018-11-28 16:04 PST
2018-11-28 16:04 PST
Provides registrant level access to AWS Cloud Map actions.
AWS managed
0
None
2015-02-06 10:39 PST
2019-09-12 16:08 PST
Provides full access to AWS CloudTrail.
AWS managed
0
None
2015-02-06 10:39 PST
2019-11-20 13:06 PST
Provides read only access to AWS CloudTrail.
AWS managed
0
None
2016-12-01 11:04 PST
2020-02-06 12:26 PST
Provides full access to AWS CodeBuild via the AWS Management Console. Also attach AmazonS3ReadOnlyAccess to provide access to download build artifacts, and attach IAMFullAccess to create and manage the service role for CodeBuild.
AWS managed
0
None
2016-12-01 11:02 PST
2020-01-02 12:18 PST
Provides access to AWS CodeBuild via the AWS Management Console, but does not allow CodeBuild project administration. Also attach AmazonS3ReadOnlyAccess to provide access to download build artifacts.
AWS managed
0
None
2016-12-01 11:03 PST
2020-01-02 12:06 PST
Provides read only access to AWS CodeBuild via the AWS Management Console. Also attach AmazonS3ReadOnlyAccess to provide access to download build artifacts.
AWS managed
0
None
2015-07-09 10:02 PST
2019-12-02 23:56 PST
Provides full access to AWS CodeCommit via the AWS Management Console.
AWS managed
0
None
2015-07-09 10:06 PST
2019-12-03 00:15 PST
Provides full access to AWS CodeCommit repositories, but does not allow repository deletion.
AWS managed
0
None
2015-07-09 10:05 PST
2019-12-03 00:08 PST
Provides read only access to AWS CodeCommit via the AWS Management Console.
AWS managed
0
None
2015-05-19 11:18 PST
2019-11-05 14:59 PST
Provides access to register and deploy a revision.
AWS managed
0
None
2015-05-19 11:13 PST
2019-11-05 14:57 PST
Provides full access to CodeDeploy resources.
AWS managed
0
None
2015-05-19 11:21 PST
2019-11-05 15:01 PST
Provides read only access to CodeDeploy resources.
AWS managed
0
None
2015-05-04 11:05 PST
2019-09-23 14:47 PST
Provides CodeDeploy service access to expand tags and interact with Auto Scaling on your behalf.
AWS managed
0
None
2018-11-27 12:40 PST
2019-09-23 15:37 PST
Provides CodeDeploy service wide access to perform an ECS blue/green deployment on your behalf. Grants full access to support services, such as full access to read all S3 objects, invoke all Lambda functions, publish to all SNS topics within the account and update all ECS services.
AWS managed
0
None
2018-11-27 12:42 PST
2019-09-23 15:10 PST
Provides CodeDeploy service limited access to perform an ECS blue/green deployment on your behalf.
AWS managed
0
None
2017-11-28 06:05 PST
2019-12-03 11:53 PST
Provides CodeDeploy service access to perform a Lambda deployment on your behalf.
AWS managed
0
None
2016-07-28 11:59 PST
2017-08-02 10:24 PST
Provides access to view and approve manual changes for all pipelines
AWS managed
0
None
2015-07-09 10:02 PST
2015-07-09 10:02 PST
Provides access for custom actions to poll for jobs details (including temporary credentials) and report status updates to AWS CodePipeline.
AWS managed
0
None
2015-07-09 09:58 PST
2019-11-05 15:04 PST
Provides full access to AWS CodePipeline via the AWS Management Console.
AWS managed
0
None
2015-07-09 09:43 PST
2019-11-05 15:01 PST
Provides read only access to AWS CodePipeline via the AWS Management Console.
AWS managed
0
None
2017-04-19 09:23 PST
2018-01-10 13:54 PST
Provides full access to AWS CodeStar via the AWS Management Console.
AWS managed
0
None
2019-11-05 08:10 PST
2020-02-12 09:52 PST
Allows AWS CodeStar Notifications to access Amazon CloudWatch Events on your behalf
AWS managed
1
Permissions policy (1)
2017-04-19 08:20 PST
2019-04-24 12:25 PST
DO NOT USE - AWS CodeStar Service Role Policy which grants administrative privileges in order for CodeStar to manage IAM and other service resources on behalf of the customer.
AWS managed
0
None
2019-06-17 11:03 PST
2020-03-04 08:51 PST
Allows Config to call AWS services and deploy config resources across organization
AWS managed
0
None
2019-06-18 14:21 PST
2019-06-18 14:21 PST
Allows AWS Config to remediate noncompliant resources on your behalf.
AWS managed
0
None
2015-04-02 10:36 PST
2019-11-18 14:42 PST
Default policy for AWS Config service role.
AWS managed
0
None
2018-03-19 15:53 PST
2018-03-19 15:53 PST
Allows AWS Config to call read-only AWS Organizations APIs
AWS managed
0
None
2016-03-25 10:59 PST
2019-05-13 14:33 PST
Allows an AWS Lambda function to access the AWS Config API and the configuration snapshots that AWS Config delivers periodically to Amazon S3. This access is required by functions that evaluate configuration changes for custom Config rules.
AWS managed
1
Permissions policy (1)
2018-05-30 16:31 PST
2019-11-18 14:33 PST
Allows Config to call AWS services and collect resource configurations on your behalf.
AWS managed
0
None
2015-02-18 11:38 PST
2019-03-18 13:27 PST
Provides access to use AWS Config, including searching by tags on resources, and reading all tags. This does not provide permission to configure AWS Config, which requires administrative privileges.
AWS managed
0
None
2015-02-11 09:14 PST
2015-09-28 12:50 PST
Enables broad read/write access to ALL EC2 objects, read/write access to S3 buckets starting with 'import-to-ec2-', and the ability to list all S3 buckets, for the AWS Connector to import VMs on your behalf.
AWS managed
0
None
2019-05-03 11:19 PST
2019-06-13 09:36 PST
Provides access to AWS Resources managed or used by AWS Control Tower
AWS managed
0
None
2019-11-13 11:27 PST
2019-11-13 11:27 PST
Grants full access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. It also provides select access to related services needed to take full advantage of AWS Data Exchange.
AWS managed
0
None
2019-11-13 11:27 PST
2019-11-25 08:25 PST
Grants data provider access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. It also provides select access to related services needed to take full advantage of AWS Data Exchange.
AWS managed
0
None
2019-11-13 11:27 PST
2019-11-13 11:27 PST
Grants read-only access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK.
AWS managed
0
None
2019-11-13 11:27 PST
2019-11-13 11:27 PST
Grants data subscriber access to AWS Data Exchange and AWS Marketplace actions using the AWS Management Console and SDK. It also provides select access to related services needed to take full advantage of AWS Data Exchange.
AWS managed
0
None
2018-07-06 12:34 PST
2019-12-19 11:42 PST
Provides appropriate permissions to AWS Data Lifecycle Manager to take actions on AWS resources
AWS managed
0
None
2017-01-19 15:14 PST
2017-08-17 11:48 PST
Provides full access to Data Pipeline, list access for S3, DynamoDB, Redshift, RDS, SNS, and IAM roles, and passRole access for default Roles.
AWS managed
0
None
2017-01-19 15:16 PST
2017-08-17 11:49 PST
Provides full access to Data Pipeline, list access for S3, DynamoDB, Redshift, RDS, SNS, and IAM roles, and passRole access for default Roles.
AWS managed
0
None
2015-02-06 10:41 PST
2017-12-22 15:43 PST
Default policy for the AWS Data Pipeline service role.
AWS managed
0
None
2019-01-18 11:40 PST
2020-01-24 09:59 PST
Provides full access to AWS DataSync and minimal access to its dependencies
AWS managed
0
None
2019-01-18 11:18 PST
2020-01-24 09:59 PST
Provides read-only access to AWS DataSync
AWS managed
0
None
2017-11-29 07:47 PST
2019-06-11 16:11 PST
This policy specifies permissions required by DeepLens Administrative lambda functions that run on a DeepLens device
AWS managed
0
None
2017-11-29 07:46 PST
2019-09-25 12:25 PST
Grants AWS DeepLens access to AWS Services, resources and roles needed by DeepLens and its dependencies including IoT, S3, GreenGrass and AWS Lambda.
AWS managed
0
None
2019-02-28 13:59 PST
2019-06-14 10:02 PST
Allows CloudFormation to create and manage AWS stacks and resources on your behalf.
AWS managed
0
None
2019-02-28 13:59 PST
2019-02-28 13:59 PST
Allows RoboMaker to create required resources and call AWS services on your behalf.
AWS managed
0
None
2019-02-28 13:58 PST
2019-06-12 13:55 PST
Allows DeepRacer to create required resources and call AWS services on your behalf.
AWS managed
0
None
2019-05-01 15:36 PST
2019-05-01 15:36 PST
Deny all access.
AWS managed
0
None
2015-07-13 09:37 PST
2015-07-13 09:37 PST
Provides full access to all AWS Device Farm operations.
AWS managed
0
None
2015-02-06 10:40 PST
2019-04-30 08:29 PST
Provides full access to AWS Direct Connect via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2019-04-30 08:23 PST
Provides read only access to AWS Direct Connect via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2019-02-05 12:29 PST
Provides full access to AWS Directory Service.
AWS managed
0
None
2015-02-06 10:41 PST
2018-09-25 14:54 PST
Provides read only access to AWS Directory Service.
AWS managed
0
None
2018-08-09 11:29 PST
2018-08-09 11:29 PST
Provides write access to AWS resources required for AWS Discovery Continuous Export
AWS managed
0
None
2018-03-20 17:08 PST
2018-04-19 14:37 PST
Allows EC2 Fleet to launch and manage instances.
AWS managed
1
Permissions policy (1)
2017-10-23 12:13 PST
2018-03-28 12:04 PST
Allows EC2 Spot Fleet to launch and manage spot fleet instances
AWS managed
1
Permissions policy (1)
2017-09-18 11:51 PST
2018-12-11 16:13 PST
Allows EC2 Spot to launch and manage spot instances
AWS managed
0
None
2017-02-21 14:50 PST
2017-02-21 14:50 PST
Provide the instance in your custom platform builder environment permission to launch EC2 instance, create EBS snapshot and AMI, stream logs to Amazon CloudWatch Logs, and store artifacts in Amazon S3.
AWS managed
0
None
2016-02-08 15:17 PST
2018-04-09 15:12 PST
AWS Elastic Beanstalk Service policy for Health Monitoring system
AWS managed
0
None
2015-02-06 10:40 PST
2019-07-10 12:27 PST
Provides full access to AWS Elastic Beanstalk and underlying services that it requires such as S3 and EC2.
AWS managed
0
None
2019-01-11 15:22 PST
2019-06-04 10:48 PST
AWS Elastic Beanstalk Service Role policy that grants limited permissions to update your resources on your behalf for maintenance purposes.
AWS managed
0
None
2019-11-21 14:35 PST
2019-11-21 14:35 PST
AWS Elastic Beanstalk Service Role policy that grants limited permissions to managed updates.
AWS managed
0
None
2016-02-08 15:15 PST
2016-06-06 16:45 PST
Provide the instances in your multicontainer Docker environment access to use the Amazon EC2 Container Service to manage container deployment tasks.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to AWS Elastic Beanstalk via the AWS Management Console.
AWS managed
0
None
2016-04-11 13:27 PST
2019-06-14 16:18 PST
AWS Elastic Beanstalk Service role policy which grants permissions to create & manage resources (i.e.: AutoScaling, EC2, S3, CloudFormation, ELB, etc.) on your behalf.
AWS managed
0
None
2017-09-13 16:46 PST
2019-06-06 14:59 PST
AWS Elastic Beanstalk Service Linked Role policy which grants permissions to create & manage resources (i.e.: AutoScaling, EC2, S3, CloudFormation, ELB, etc.) on your behalf.
AWS managed
0
None
2016-02-08 15:08 PST
2019-02-28 16:04 PST
Provide the instances in your web server environment access to upload log files to Amazon S3.
AWS managed
0
None
2016-02-08 15:12 PST
2019-02-28 16:07 PST
Provide the instances in your worker environment access to upload log files to Amazon S3, to use Amazon SQS to monitor your application's job queue, to use Amazon DynamoDB to perform leader election, and to Amazon CloudWatch to publish metrics for health monitoring.
AWS managed
0
None
2017-09-19 15:36 PST
2019-10-07 16:04 PST
Service Linked Role Policy for AWS Elastic Load Balancing Control Plane - Classic
AWS managed
1
Permissions policy (1)
2017-09-19 15:19 PST
2019-10-07 15:55 PST
Service Linked Role Policy for AWS Elastic Load Balancing Control Plane
AWS managed
0
None
2018-06-25 12:25 PST
2019-06-10 15:52 PST
Provides full access to AWS Elemental MediaConvert via the AWS Management Console and SDK.
AWS managed
0
None
2018-06-25 12:25 PST
2019-06-10 15:52 PST
Provides read only access to AWS Elemental MediaConvert via the AWS Management Console and SDK.
AWS managed
0
None
2017-12-29 15:39 PST
2017-12-29 15:39 PST
Provides full access to AWS Elemental MediaPackage resources
AWS managed
0
None
2017-12-29 16:04 PST
2017-12-29 16:04 PST
Provides read only access to AWS Elemental MediaPackage resources
AWS managed
0
None
2018-03-05 15:15 PST
2018-03-05 15:15 PST
Provides full read and write access to all MediaStore APIs
AWS managed
0
None
2018-03-08 11:48 PST
2018-03-08 11:48 PST
Provides read-only permissions for MediaStore APIs
AWS managed
0
None
2017-09-20 10:29 PST
2017-09-20 10:29 PST
Policy to enable enhanced classic networking management feature.
AWS managed
0
None
2018-05-09 11:06 PST
2018-05-09 11:06 PST
Full access for AWS FM Administrator
AWS managed
0
None
2018-05-09 13:07 PST
2018-05-09 13:07 PST
Read only access for AWS FM Administrator that allows monitoring AWS FM operations
AWS managed
0
None
2018-05-09 14:05 PST
2018-05-09 14:05 PST
Provides read only access to AWS WAF actions for AWS Firewall Manager member accounts
AWS managed
0
None
2019-10-29 17:27 PST
2020-01-20 15:20 PST
Managed policy for AWS For Wordpress Plugin
AWS managed
0
None
2019-04-05 12:39 PST
2019-10-14 14:05 PST
Policy granting permissions to AWS Global Accelerator to manage EC2 Elastic Network Interfaces and Security Groups.
AWS managed
0
None
2017-08-14 06:37 PST
2019-02-11 11:49 PST
Provides full access to AWS Glue via the AWS Management Console
AWS managed
0
None
2018-10-05 10:52 PST
2019-09-26 10:14 PST
Provides full access to AWS Glue via the AWS Management Console and access to sagemaker notebook instances.
AWS managed
0
None
2017-08-14 06:37 PST
2019-10-07 11:05 PST
Policy for AWS Glue service role which allows customer to manage notebook server
AWS managed
1
Permissions policy (1)
2017-08-14 06:37 PST
2018-06-25 11:23 PST
Policy for AWS Glue service role which allows access to related services including EC2, S3, and Cloudwatch Logs
AWS managed
0
None
2017-05-02 17:47 PST
2017-05-02 17:47 PST
This policy gives full access to the AWS Greengrass configuration, management and deployment actions
AWS managed
0
None
2018-10-30 09:01 PST
2018-10-30 09:01 PST
This policy gives read only access to the AWS Greengrass configuration, management and deployment actions
AWS managed
0
None
2017-02-14 13:17 PST
2018-11-13 16:35 PST
Policy for AWS Greengrass service role which allows access to related services including AWS Lambda and AWS IoT thing shadows.
AWS managed
0
None
2016-12-06 04:30 PST
2019-12-22 06:25 PST
Allows full access to the AWS Health Apis and Notifications and the Personal Health Dashboard
AWS managed
0
None
2019-12-20 10:25 PST
2019-12-20 10:25 PST
Provides full access to all AWS Image Builder actions and resource scoped access to related AWS services.
AWS managed
0
None
2019-12-19 14:29 PST
2019-12-19 14:29 PST
Provides read only access to all AWS Image Builder actions.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read and write access to the jobs created under the AWS account.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read only access to the jobs created under the AWS account.
AWS managed
0
None
2018-05-11 15:10 PST
2018-05-11 15:10 PST
Provides full access to AWS IoT 1-Click.
AWS managed
0
None
2018-05-11 14:49 PST
2018-05-11 14:49 PST
Provides read only access to AWS IoT 1-Click.
AWS managed
0
None
2018-06-18 16:02 PST
2018-06-18 16:02 PST
Provides full access to IoT Analytics.
AWS managed
0
None
2018-06-18 14:37 PST
2018-06-18 14:37 PST
Provides read only access to IoT Analytics.
AWS managed
0
None
2015-10-27 14:52 PST
2019-09-27 13:48 PST
This policy gives full access to the AWS IoT configuration actions
AWS managed
0
None
2015-10-27 14:52 PST
2019-09-27 13:52 PST
This policy gives read only access to the AWS IoT configuration actions
AWS managed
0
None
2015-10-27 14:51 PST
2017-11-16 10:24 PST
This policy gives full access to the AWS IoT messaging actions
AWS managed
0
None
2019-08-07 10:55 PST
2019-08-07 10:55 PST
Provides write access to IoT thing groups and read access to IoT Certificates for execution of ADD_THINGS_TO_THING_GROUP mitigation action
AWS managed
0
None
2018-07-18 14:17 PST
2019-11-25 15:52 PST
Provides read access for IoT and related resources
AWS managed
0
None
2019-08-07 10:04 PST
2019-08-07 10:04 PST
Provides access for enabling IoT logging for execution of ENABLE_IOT_LOGGING mitigation action
AWS managed
0
None
2019-08-07 10:04 PST
2019-08-07 10:04 PST
Provides messages publish access to SNS topic for execution of PUBLISH_FINDING_TO_SNS mitigation action
AWS managed
0
None
2019-08-07 10:04 PST
2019-08-07 10:04 PST
Provides write access to IoT policies for execution of REPLACE_DEFAULT_POLICY_VERSION mitigation action
AWS managed
0
None
2019-08-07 10:05 PST
2019-08-07 10:05 PST
Provides write access to IoT CA certificates for execution of UPDATE_CA_CERTIFICATE mitigation action
AWS managed
0
None
2019-08-07 10:06 PST
2019-08-07 10:06 PST
Provides write access to IoT certificates for execution of UPDATE_DEVICE_CERTIFICATE mitigation action
AWS managed
0
None
2020-02-12 12:33 PST
2020-02-18 10:05 PST
Allows AWS IoT Device Tester to run the FreeRTOS qualification suite by allowing access to services including IoT, S3, and IAM
AWS managed
0
None
2020-02-20 13:21 PST
2020-02-26 10:26 PST
Allows AWS IoT Device Tester to run the AWS Greengrass qualification suite by allowing access to related services including Lambda, IoT, API Gateway, IAM
AWS managed
0
None
2019-01-10 14:51 PST
2019-01-10 14:51 PST
Provides full access to IoT Events.
AWS managed
0
None
2019-01-10 14:50 PST
2019-09-23 10:22 PST
Provides read only access to IoT Events.
AWS managed
0
None
2015-10-08 08:19 PST
2015-10-08 08:19 PST
This policy gives full access to the AWS IoT configuration and messaging actions
AWS managed
0
None
2015-10-08 08:17 PST
2015-10-08 08:17 PST
Allows creation of Amazon CloudWatch Log groups and streaming logs to the groups
AWS managed
0
None
2017-12-20 12:36 PST
2017-12-20 12:36 PST
Allows access to create AWS IoT Job and describe the AWS code signer job
AWS managed
0
None
2015-10-08 08:14 PST
2018-01-16 11:28 PST
Allows access to all AWS services supported in AWS IoT Rule Actions
AWS managed
0
None
2019-05-31 14:37 PST
2019-05-31 14:37 PST
Provides full access to manage AWS IoT SiteWise using the AWS Management Console. Note this policy also grants access to create and list data stores used with AWS IoT SiteWise (e.g. AWS IoT Analytics), access to list and view AWS IoT Greengrass resources, list and modify AWS Secrets Manager secrets, retrieve AWS IoT thing shadows, list resources with specific tags, and create and use a service-linked role for AWS IoT SiteWise.
AWS managed
0
None
2018-12-04 12:53 PST
2018-12-04 12:53 PST
Provides full access to IoT SiteWise.
AWS managed
0
None
2019-11-13 16:59 PST
2019-12-13 14:19 PST
This role grants AWS IoT SiteWise monitor permissions to access your AWS IoT SiteWise assets & asset properties, and create AWS IoT Sitewise projects, dashboards & access policies through AWS IoT SiteWise portals.
AWS managed
0
None
2018-12-04 12:55 PST
2018-12-04 12:55 PST
Provides read only access to IoT SiteWise.
AWS managed
0
None
2017-12-01 12:21 PST
2020-02-27 15:27 PST
This policy allows users to register things at bulk using AWS IoT StartThingRegistrationTask API
AWS managed
0
None
2019-08-22 12:28 PST
2019-08-22 12:28 PST
Used by AWS IQ to execute payment requests on behalf of a customer
AWS managed
0
None
2019-04-04 16:13 PST
2019-09-25 13:22 PST
Provides full access to AWS IQ
AWS managed
0
None
2019-08-22 12:36 PST
2019-08-22 12:36 PST
Allows AWS IQ to manage the role assumed by AWS IQ experts.
AWS managed
0
None
2018-11-14 12:10 PST
2018-11-14 12:10 PST
Enables access to AWS services and resources required for AWS KMS custom key stores
AWS managed
0
None
2015-02-06 10:40 PST
2017-03-06 16:55 PST
Provides access to AWS Key Management Service (KMS).
AWS managed
0
None
2019-08-08 10:33 PST
2019-12-16 14:41 PST
Grants administrative access to AWS Lake Formation and related services, such as AWS Glue, to manage data lakes
AWS managed
3
Permissions policy (3)
2015-04-09 08:03 PST
2015-04-09 08:03 PST
Provides write permissions to CloudWatch Logs.
AWS managed
0
None
2015-04-09 08:09 PST
2015-04-09 08:09 PST
Provides list and read access to DynamoDB streams and write permissions to CloudWatch logs.
AWS managed
0
None
2016-12-05 16:37 PST
2016-12-05 16:37 PST
Provides minimum permissions for a Lambda function to manage ENIs (create, describe, delete) used by a VPC-enabled Lambda Function.
AWS managed
1
Permissions policy (1)
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides Put, Get access to S3 and full access to CloudWatch Logs.
AWS managed
0
None
2015-02-06 10:40 PST
2017-11-27 15:22 PST
Provides full access to Lambda, S3, DynamoDB, CloudWatch Metrics and Logs.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides read access to DynamoDB Streams.
AWS managed
0
None
2015-04-09 08:14 PST
2018-11-19 12:09 PST
Provides list and read access to Kinesis streams and write permissions to CloudWatch logs.
AWS managed
0
None
2015-02-06 10:40 PST
2018-09-06 11:04 PST
Provides read only access to Lambda, S3, DynamoDB, CloudWatch Metrics and Logs.
AWS managed
0
None
2017-05-23 10:53 PST
2017-12-07 16:17 PST
Grants Lambda Replicator necessary permissions to replicate functions across regions
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Default policy for AWS Lambda service role.
AWS managed
0
None
2018-06-14 14:50 PST
2018-06-14 14:50 PST
Provides receive message, delete message, and read attribute access to SQS queues, and write permissions to CloudWatch logs.
AWS managed
1
Permissions policy (1)
2016-02-11 15:15 PST
2016-02-11 15:15 PST
Provides minimum permissions for a Lambda function to execute while accessing a resource within a VPC - create, describe, delete network interfaces and write permissions to CloudWatch Logs.
AWS managed
0
None
2018-11-26 11:03 PST
2019-08-29 15:56 PST
AWS License Manager service master account role policy
AWS managed
0
None
2018-11-26 11:04 PST
2019-11-15 14:09 PST
AWS License Manager service member account role policy
AWS managed
0
None
2018-11-26 11:02 PST
2019-11-15 14:10 PST
AWS License Manager service default role policy
AWS managed
0
None
2015-02-11 09:21 PST
2018-08-08 14:13 PST
Provides the ability to subscribe and unsubscribe to AWS Marketplace software, allows users to manage Marketplace software instances from the Marketplace 'Your Software' page, and provides administrative access to EC2.
AWS managed
0
None
2017-03-27 12:37 PST
2017-03-27 12:37 PST
Provides read access to AWS Marketplace Entitlements
AWS managed
0
None
2018-07-31 16:29 PST
2018-08-08 14:11 PST
Provides full access to AWS Marketplace Private Image Build Feature. In addition to create private images, it also provides permissions to add tags to images, launch and terminate ec2 instances.
AWS managed
0
None
2015-02-06 10:40 PST
2019-10-28 14:49 PST
Provides the ability to subscribe and unsubscribe to AWS Marketplace software
AWS managed
0
None
2016-03-17 15:39 PST
2016-03-17 15:39 PST
Provides full access to AWS Marketplace Metering.
AWS managed
0
None
2019-11-20 17:17 PST
2019-11-20 17:17 PST
Provides permissions to register a resource and track usage through AWS Marketplace Metering Service.
AWS managed
0
None
2019-06-25 06:07 PST
2019-06-25 06:07 PST
Provides full access to all administrative actions for an AWS Marketplace eProcurement integration.
AWS managed
0
None
2015-02-06 10:40 PST
2019-10-28 14:51 PST
Provides the ability to review AWS Marketplace subscriptions
AWS managed
0
None
2019-07-02 13:40 PST
2019-07-02 13:40 PST
Provides full access to all seller operations on the AWS Marketplace and other AWS services such as AMI management.
AWS managed
0
None
2019-07-02 14:06 PST
2019-07-02 14:06 PST
Provides sellers full access to AWS Marketplace Management Products page and other AWS services such as AMI management.
AWS managed
0
None
2019-07-02 14:40 PST
2019-07-02 14:40 PST
Provide sellers read-only access to AWS Marketplace Management Products page.
AWS managed
0
None
2017-08-14 06:30 PST
2020-02-20 08:35 PST
Policy allows AWSMigrationHubService to call AWSApplicationDiscoveryService on behalf of the customer.
AWS managed
0
None
2017-08-14 07:00 PST
2019-10-07 10:51 PST
Policy for Database Migration Service to assume role in customer's account to call Migration Hub
AWS managed
0
None
2017-08-14 07:02 PST
2019-06-19 14:14 PST
Managed policy to provide the customer access to the Migration Hub Service
AWS managed
0
None
2017-08-14 06:57 PST
2019-10-07 11:01 PST
Policy for Server Migration Service to assume role in customer's account to call Migration Hub
AWS managed
0
None
2016-01-05 11:56 PST
2019-12-19 15:15 PST
This policy may be attached to any User, Role, or Group, in order to grant users permission to create, delete, and modify projects (and their associated AWS resources) in AWS Mobile Hub. This also includes permissions to generate and download sample mobile app source code for each Mobile Hub project.
AWS managed
0
None
2016-01-05 11:55 PST
2018-07-23 14:59 PST
This policy may be attached to any User, Role, or Group, in order to grant users permission to list and view projects in AWS Mobile Hub. This also includes permissions to generate and download sample mobile app source code for each Mobile Hub project. It does not allow the user to modify any configuration for any Mobile Hub project.
AWS managed
0
None
2019-12-03 09:37 PST
2019-12-03 09:37 PST
Provides full access to Amazon NetworkManager via the AWS Management Console.
AWS managed
0
None
2019-12-03 09:35 PST
2019-12-03 09:35 PST
Provides read only access to Amazon NetworkManager via the AWS Management Console.
AWS managed
0
None
2019-12-03 06:03 PST
2019-12-10 12:41 PST
Allow NetworkManager to access resources associated with your Global Networks
AWS managed
0
None
2017-03-30 10:47 PST
2017-03-30 10:47 PST
Enables OpsWorks instances with the CWLogs integration enabled to ship logs and create required log groups
AWS managed
0
None
2016-11-24 01:48 PST
2019-10-22 00:40 PST
Provides S3 access for instances launched by OpsWorks CM.
AWS managed
0
None
2016-11-24 01:49 PST
2019-12-16 05:45 PST
Service Role Policy to be used for Creating OpsWorks CM servers.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to AWS OpsWorks.
AWS managed
0
None
2016-06-03 07:23 PST
2016-06-03 07:23 PST
Provides access for an Amazon EC2 instance to register with an AWS OpsWorks stack.
AWS managed
0
None
2019-06-18 08:56 PST
2019-06-18 08:56 PST
Policy to enable registration of EC2 instances via the OpsWorks CLI
AWS managed
0
None
2019-06-18 08:33 PST
2019-06-18 08:33 PST
Policy to enable registration of On-Premises instances via the OpsWorks CLI
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Default policy for AWS OpsWorks service role.
AWS managed
0
None
2018-11-06 12:31 PST
2018-11-06 12:31 PST
Provides full access to AWS Organizations.
AWS managed
0
None
2018-11-06 12:32 PST
2018-11-06 12:32 PST
Provides read-only access to AWS Organizations.
AWS managed
1
Permissions policy (1)
2017-10-10 16:04 PST
2017-10-31 23:01 PST
A policy to allow AWS Organizations to share trust with other approved AWS Services for the purpose of simplifying customer configuration.
AWS managed
0
None
2017-11-21 16:36 PST
2017-11-21 16:36 PST
Provides full access to AWS Price List Service.
AWS managed
0
None
2018-11-27 08:32 PST
2019-10-28 14:48 PST
Provides full access to all administrative actions for an AWS Private Marketplace.
AWS managed
0
None
2019-10-28 14:44 PST
2019-10-28 14:44 PST
Provides access to creating requests in an AWS Private Marketplace.
AWS managed
0
None
2016-12-08 18:31 PST
2019-09-10 10:59 PST
Quicksight access to Athena API and S3 buckets used for Athena query results
AWS managed
0
None
2015-11-10 15:24 PST
2015-11-10 15:24 PST
Allow QuickSight to describe the RDS resources
AWS managed
0
None
2015-11-10 15:25 PST
2015-11-10 15:25 PST
Allow QuickSight to describe Redshift resources
AWS managed
0
None
2017-11-29 09:00 PST
2017-11-29 09:00 PST
Give QuickSight read-only access to IoT Analytics datasets
AWS managed
0
None
2015-11-10 15:25 PST
2015-11-10 15:25 PST
Allow QuickSight to list IAM entities
AWS managed
0
None
2020-01-17 09:18 PST
2020-01-17 09:18 PST
Provides access to Amazon SageMaker resources from Amazon QuickSight
AWS managed
0
None
2019-06-04 10:28 PST
2019-06-04 10:28 PST
Provides full access to AWS Resource Access Manager
AWS managed
0
None
2019-12-09 12:58 PST
2019-12-09 12:58 PST
Provides read only access to AWS Resource Access Manager.
AWS managed
0
None
2019-12-09 12:41 PST
2019-12-09 12:41 PST
Provides access to AWS Resource Access Manager APIs needed by a resource share participant.
AWS managed
0
None
2018-11-14 11:28 PST
2018-11-14 11:28 PST
Policy containing Read-only AWS Resource Access Manager access to customers' Organizations structure. It also contains IAM permissions to self-delete the role.
AWS managed
0
None
2018-03-07 02:27 PST
2019-02-05 09:56 PST
This is the read only policy for AWS Resource Groups
AWS managed
0
None
2018-11-25 21:28 PST
2018-11-25 21:28 PST
Provides full access to AWS RoboMaker via the AWS Management Console and SDK. Also provides select access to related services (e.g., S3, IAM).
AWS managed
0
None
2018-11-25 21:30 PST
2018-11-25 21:30 PST
Provides read only access to AWS RoboMaker via the AWS Management Console and SDK
AWS managed
0
None
2018-11-25 22:30 PST
2020-02-04 11:33 PST
RoboMaker service policy
AWS managed
0
None
2018-11-25 21:33 PST
2018-11-25 21:33 PST
RoboMaker service policy
AWS managed
0
None
2019-11-06 14:45 PST
2019-11-06 14:45 PST
Provides full access to Savings Plans service
AWS managed
0
None
2019-11-06 14:45 PST
2019-11-06 14:45 PST
Provides read only access to Savings Plans service
AWS managed
0
None
2018-11-27 15:54 PST
2018-11-27 15:54 PST
Provides full access to use AWS Security Hub.
AWS managed
0
None
2018-11-27 17:34 PST
2019-06-25 15:45 PST
Provides read only access to AWS Security Hub resources
AWS managed
1
Permissions policy (1)
2018-11-27 15:47 PST
2020-02-05 13:38 PST
A service-linked role required for AWS Security Hub to access your resources.
AWS managed
0
None
2018-02-15 09:19 PST
2019-02-05 17:57 PST
Provides full access to service catalog admin capabilities
AWS managed
0
None
2019-10-25 11:53 PST
2019-10-25 11:53 PST
Provides read-only access to Service Catalog admin capabilities
AWS managed
0
None
2018-02-15 09:22 PST
2019-07-10 13:30 PST
Provides full access to service catalog enduser capabilities
AWS managed
0
None
2019-10-25 11:49 PST
2019-10-25 11:49 PST
Provides read-only access to Service Catalog end-user capabilities
AWS managed
0
None
2019-11-06 17:34 PST
2020-02-21 12:40 PST
Permissions required for managing nodegroups in the customer's account. These policies related to management of the following resources: AutoscalingGroups, SecurityGroups, LaunchTemplates and InstanceProfiles.
AWS managed
0
None
2017-10-12 11:31 PST
2017-10-12 11:31 PST
Allows EC2 Scheduled Instances to launch and manage spot instances.
AWS managed
0
None
2020-01-16 13:47 PST
2020-01-16 13:47 PST
Gamma Internal AWS Service Role for EKS Nodegroups
AWS managed
0
None
2019-11-29 14:02 PST
2020-02-28 11:03 PST
Allows EC2ImageBuilder to call AWS services on your behalf.
AWS managed
0
None
2018-11-14 11:19 PST
2019-11-21 13:52 PST
Allows AWS IoT SiteWise to provision and manage gateways as well as query data. The policy includes required AWS Greengrass permissions for deploying to groups, AWS Lambda permissions for creating and updating service-prefixed functions, and AWS IoT Analytics permissions for querying data from datastores.
AWS managed
0
None
2019-10-04 10:31 PST
2019-10-04 10:31 PST
Allows Log Delivery service to deliver logs by calling log destination on your behalf.
AWS managed
0
None
2019-08-06 11:39 PST
2019-12-23 15:18 PST
Provides access to AWS services and resources necessary to migrate service instances into AWS including EC2, S3 and Cloudformation.
AWS managed
0
None
2018-06-05 15:29 PST
2019-02-11 09:08 PST
Provides the AWS DDoS Response Team with limited access to your AWS account to assist with DDoS attack mitigation during a high-severity event.
AWS managed
0
None
2018-10-31 16:54 PST
2018-10-31 16:54 PST
Administrator access for SSO Directory
AWS managed
0
None
2018-10-31 16:49 PST
2019-11-26 14:37 PST
ReadOnly access for SSO Directory
AWS managed
0
None
2018-06-27 13:36 PST
2018-10-17 13:41 PST
Provides access within AWS SSO to manage AWS Organizations master and member accounts and cloud application
AWS managed
0
None
2018-06-27 13:45 PST
2018-10-17 13:35 PST
Provides access within AWS SSO to manage AWS Organizations member accounts and cloud application
AWS managed
0
None
2018-06-27 13:24 PST
2019-10-24 08:45 PST
Provides read only access to AWS SSO configurations.
AWS managed
0
None
2017-12-05 10:36 PST
2019-08-30 12:55 PST
Grants AWS SSO permissions to manage AWS resources, including IAM roles, policies and SAML IdP on your behalf.
AWS managed
0
None
2017-01-11 13:54 PST
2017-01-11 16:19 PST
An access policy for providing a user/role/etc access to the AWS StepFunctions console. For a full console experience, in addition to this policy, a user may need iam:PassRole permission on other IAM roles that can be assumed by the service.
AWS managed
0
None
2017-01-11 13:51 PST
2017-01-11 13:51 PST
An access policy for providing a user/role/etc access to the AWS StepFunctions API. For full access, in addition to this policy, a user MUST have iam:PassRole permission on at least one IAM role that can be assumed by the service.
AWS managed
0
None
2017-01-11 13:46 PST
2017-11-10 14:03 PST
An access policy for providing a user/role/etc read only access to the AWS StepFunctions service.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides full access to AWS Storage Gateway via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides access to AWS Storage Gateway via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Allows users to access the AWS Support Center.
AWS managed
1
Permissions policy (1)
2018-04-19 11:04 PST
2019-12-16 11:39 PST
AWS managed
0
None
2019-10-24 10:21 PST
2019-10-24 10:21 PST
Grants AWS Systems Manager (SSM) permission to discover AWS account information.
AWS managed
0
None
2019-01-14 07:32 PST
2019-01-14 07:32 PST
Allows AWS Transfer full access to create log streams and groups and put log events to your account
AWS managed
0
None
2019-11-19 09:41 PST
2019-11-19 09:41 PST
Service Policy for Trusted Advisor Multi-account Reporting
AWS managed
1
Permissions policy (1)
2018-02-22 13:24 PST
2019-11-15 14:11 PST
Access for the AWS Trusted Advisor Service to help reduce cost, increase performance, and improve security of your AWS environment.
AWS managed
0
None
2019-08-06 07:13 PST
2019-08-06 07:13 PST
Allow Site-to-Site VPN to create and manage resources related to your VPN Connections.
AWS managed
0
None
2018-11-26 08:21 PST
2018-11-26 08:21 PST
Allow VPC Transit Gateway to create and manage necessary resources for your Transit Gateway VPC Attachments.
AWS managed
0
None
2015-10-06 13:44 PST
2020-01-07 12:50 PST
Provides full access to AWS WAF actions.
AWS managed
0
None
2015-10-06 13:43 PST
2020-01-07 11:27 PST
Provides read only access to AWS WAF actions.
AWS managed
0
None
2018-08-28 16:00 PST
2018-08-28 16:00 PST
Allow the AWS X-Ray Daemon to relay raw trace segments data to the service's API and retrieve sampling data (rules, targets, etc.) to be used by the X-Ray SDK.
AWS managed
0
None
2016-12-01 10:30 PST
2016-12-01 10:30 PST
AWS X-Ray full access managed policy
AWS managed
0
None
2016-12-01 10:27 PST
2019-04-30 11:11 PST
AWS X-Ray read only managed policy
AWS managed
0
None
2016-12-01 10:19 PST
2018-08-28 16:03 PST
AWS X-Ray write only managed policy
Job function
0
None
2016-11-10 09:33 PST
2018-02-06 15:46 PST
Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods.
AWS managed
0
None
2018-12-10 13:20 PST
2019-11-06 10:51 PST
Policy to enable AWS Client VPN to manage your Client VPN endpoints.
AWS managed
0
None
2019-12-09 16:20 PST
2019-12-09 16:20 PST
Service Role for CloudFormation StackSets (Organization Master Account)
AWS managed
0
None
2019-12-09 15:52 PST
2019-12-09 15:52 PST
Service Role for CloudFormation StackSets (Organization Member Account)
AWS managed
0
None
2015-02-06 10:39 PST
2020-02-19 11:52 PST
Provides full access to the CloudFront console plus the ability to list Amazon S3 buckets via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:39 PST
2020-02-19 11:49 PST
Provides access to CloudFront distribution configuration information and list distributions via the AWS Management Console.
AWS managed
0
None
2017-11-06 11:12 PST
2017-11-06 11:12 PST
Enables access to AWS resources used or managed by CloudHSM
AWS managed
0
None
2015-02-06 10:39 PST
2015-02-06 10:39 PST
Provides full access to the Amazon CloudSearch configuration service.
AWS managed
0
None
2015-02-06 10:39 PST
2015-02-06 10:39 PST
Provides read only access to the Amazon CloudSearch configuration service.
AWS managed
0
None
2018-10-24 14:21 PST
2018-10-24 14:21 PST
Permission policy for CloudTrail ServiceLinkedRole
AWS managed
0
None
2019-07-23 02:59 PST
2019-07-23 02:59 PST
Allows CloudWatch to assume CloudWatch-CrossAccountSharing roles in remote accounts on behalf of the current account in order to display data cross-account, cross-region
AWS managed
0
None
2015-07-06 17:00 PST
2015-07-06 17:00 PST
Provides read-only access to CloudWatch alarms and metrics as well as EC2 metadata. Provides access to Stop, Terminate and Reboot EC2 instances.
AWS managed
0
None
2018-03-06 16:52 PST
2018-03-06 16:52 PST
Full permissions required to use AmazonCloudWatchAgent.
AWS managed
0
None
2018-03-06 17:06 PST
2019-10-17 16:08 PST
Permissions required to use AmazonCloudWatchAgent on servers
AWS managed
0
None
2018-12-01 08:22 PST
2019-10-31 18:06 PST
Cloudwatch Application Insights Service Linked Role Policy
AWS managed
0
None
2019-07-23 03:01 PST
2019-11-20 04:58 PST
Provides access to the non-CloudWatch APIs used to display CloudWatch Automatic Dashboards, including the contents of objects such as Lambda functions
AWS managed
0
None
2016-01-14 10:35 PST
2016-01-14 10:35 PST
Allows built-in targets in Amazon CloudWatch Events to perform EC2 actions on your behalf.
AWS managed
0
None
2016-01-14 10:37 PST
2016-01-14 10:37 PST
Provides full access to Amazon CloudWatch Events.
AWS managed
0
None
2016-01-14 10:36 PST
2016-01-14 10:36 PST
Allows Amazon CloudWatch Events to relay events to the streams in AWS Kinesis Streams in your account.
AWS managed
0
None
2016-01-14 10:27 PST
2017-08-10 10:25 PST
Provides read only access to Amazon CloudWatch Events.
AWS managed
0
None
2017-11-16 16:42 PST
2017-11-16 16:42 PST
Allow AWS CloudWatch to execute actions on your behalf configured through alarms and events.
AWS managed
0
None
2015-02-06 10:40 PST
2018-08-09 12:10 PST
Provides full access to CloudWatch.
AWS managed
0
None
2015-02-06 10:40 PST
2015-02-06 10:40 PST
Provides full access to CloudWatch Logs
AWS managed
0
None
2015-02-06 10:40 PST
2019-01-14 11:32 PST
Provides read only access to CloudWatch Logs
AWS managed
0
None
2015-02-06 10:40 PST
2018-05-10 14:40 PST
Provides read only access to CloudWatch.
AWS managed
0
None
2019-11-25 09:39 PST
2019-11-25 09:39 PST
Provides full access to CloudWatch Synthetics.
AWS managed
0
None
2019-11-25 09:45 PST
2019-11-25 09:45 PST
Provides read only access to CloudWatch Synthetics.
AWS managed
0
None
2019-03-06 14:28 PST
2019-03-06 14:28 PST
Policy for AWS Comprehend service role which allows access to S3 resources for data access
AWS managed
0
None
2017-11-29 10:08 PST
2017-12-04 17:36 PST
Provides full access to Amazon Comprehend.
AWS managed
0
None
2018-11-27 09:55 PST
2018-11-27 09:55 PST
Provides full access to Amazon Comprehend Medical
AWS managed
0
None
2017-11-29 10:10 PST
2019-11-25 11:35 PST
Provides read-only access to Amazon Comprehend.
AWS managed
0
None
2019-12-03 00:45 PST
2019-12-03 00:45 PST
Allows ComputeOptimizer to call AWS services and collect workload details on your behalf.
AWS managed
0
None
2019-07-25 14:38 PST
2019-11-13 10:29 PST
Policy needed for AWSConfig to create conformance packs
Job function
0
None
2016-11-10 09:25 PST
2019-01-07 16:48 PST
Grants full access permissions to AWS services and actions required to set up and configure AWS database services.
Job function
0
None
2016-11-10 09:28 PST
2019-12-03 08:48 PST
Grants permissions to AWS data analytics services.
AWS managed
0
None
2018-03-05 09:51 PST
2018-03-05 09:51 PST
This policy allows DAX to create and manage Network interface, Security group, Subnet and Vpc on behalf of customer
AWS managed
0
None
2019-11-15 13:13 PST
2019-11-15 13:13 PST
Permissions required to support Amazon CloudWatch Contributor Insights for Amazon DynamoDB.
AWS managed
0
None
2017-11-09 15:55 PST
2020-01-22 14:55 PST
Permissions required by DynamoDB for cross-region data replication
AWS managed
0
None
2019-12-23 11:47 PST
2019-12-23 11:47 PST
Policy granting permissions to EC2 Fleet to launch instances in the future.
AWS managed
0
None
2019-06-27 11:53 PST
2019-06-27 11:53 PST
Allows customers to call EC2 Instance Connect to publish ephemeral keys to their EC2 instances and connect via ssh or the EC2 Instance Connect CLI.
AWS managed
0
None
2019-12-01 11:08 PST
2019-12-01 11:08 PST
EC2 Instance profile for Image Builder service.
AWS managed
0
None
2017-12-07 09:50 PST
2020-02-06 13:27 PST
This policy allows ElastiCache to manage AWS resources on your behalf as necessary for managing your cache
AWS managed
0
None
2018-09-20 13:42 PST
2019-03-25 14:33 PST
Provides full access to Amazon ElasticLoadBalancing, and limited access to other services necessary to provide ElasticLoadBalancing features.
AWS managed
0
None
2018-09-20 13:17 PST
2018-09-20 13:17 PST
Provides read only access to Amazon ElasticLoadBalancing and dependent services
AWS managed
0
None
2019-07-31 09:28 PST
2019-12-02 10:50 PST
Allow AWS user to use the aesop console to manage quotes
AWS managed
0
None
2018-03-28 16:01 PST
2019-08-14 14:35 PST
Access policy to allow FM service linked role to perform FM-related actions on FM-managed resources within a customer AWS Organization account.
AWS managed
0
None
2018-11-28 02:40 PST
2018-11-28 02:40 PST
Allows Amazon FSx to delete its Service Linked Roles for Amazon S3 access
AWS managed
0
None
2018-11-26 18:44 PST
2019-10-21 14:25 PST
Allow GlobalAccelerator Users full Access to all APIs
AWS managed
0
None
2018-11-26 18:41 PST
2018-11-26 18:41 PST
Allow GlobalAccelerator Users Access to Read Only APIs
AWS managed
0
None
2017-11-29 10:11 PST
2018-12-17 16:59 PST
Provides read access to the Greengrass OTA Update artifacts in all Greengrass regions
AWS managed
0
None
2019-12-16 05:28 PST
2019-12-16 05:28 PST
AWS Health policy to enable Organizational View feature
AWS managed
0
None
2019-06-21 12:33 PST
2019-06-21 12:33 PST
This policy grants access to read all access information provided by IAM access advisor such as service last accessed information.
AWS managed
0
None
2019-12-02 09:12 PST
2019-12-02 09:12 PST
Provides full access to IAM Access Analyzer
AWS managed
0
None
2019-12-02 09:12 PST
2019-12-02 09:12 PST
Provides read only access to IAM Access Analyzer resources
AWS managed
0
None
2015-02-06 10:40 PST
2019-06-21 12:40 PST
Provides full access to IAM via the AWS Management Console.
AWS managed
0
None
2015-02-06 10:40 PST
2018-01-25 11:11 PST
Provides read only access to IAM via the AWS Management Console.
AWS managed
0
None
2016-12-22 09:25 PST
2016-12-22 09:25 PST
Allows an IAM user to manage their own Service Specific Credentials.
AWS managed
0
None
2016-11-14 16:25 PST
2016-11-15 15:18 PST
Provides the ability for an IAM user to change their own password.
AWS managed
0
None
2015-07-09 10:08 PST
2015-07-09 10:08 PST
Provides the ability for an IAM user to manage their own SSH keys.
AWS managed
0
None
2018-11-15 15:31 PST
2019-05-23 12:58 PST
IAM service linked role policy for Kafka.
AWS managed
0
None
2019-06-20 13:46 PST
2019-06-20 13:46 PST
Policy to grant temporary data access to Lake Formation resources
AWS managed
0
None
2017-02-17 14:18 PST
2019-11-13 14:29 PST
Policy for AWS Lex Bot use case
AWS managed
0
None
2017-02-17 15:23 PST
2017-02-17 15:23 PST
Policy for AWS Lex Channel use case
AWS managed
0
None
2018-09-28 09:35 PST
2018-09-28 09:35 PST
AWS Lightsail service linked role policy which grants permissions to export resources
AWS managed
0
None
2019-06-12 10:50 PST
2019-10-07 10:57 PST
Policy for Database Migration Service to assume role in customer's account to call Migration Hub
AWS managed
0
None
2019-06-12 10:22 PST
2020-02-20 08:59 PST
Allows Migration Hub to call Application Discovery Service on your behalf
AWS managed
0
None
2019-06-12 11:30 PST
2019-10-07 11:02 PST
Policy for Server Migration Service to assume role in customer's account to call Migration Hub
AWS managed
0
None
2018-06-19 14:35 PST
2020-01-23 12:49 PST
Provides full access to manage Amazon Neptune using the AWS Console. Note this policy also grants full access to publish on all SNS topics within the account, permissions to create and edit Amazon EC2 instances and VPC configurations, permissions to view and list keys on Amazon KMS, and full access to Amazon RDS. For more information, see https://aws.amazon.com/neptune/faqs/.
AWS managed
0
None
2018-05-30 12:17 PST
2020-02-12 15:28 PST
Provides full access to Amazon Neptune. Note this policy also grants full access to publish on all SNS topics within the account and full access to Amazon RDS. For more information, see https://aws.amazon.com/neptune/faqs/.
AWS managed
0
None
2018-05-30 12:16 PST
2018-05-30 12:16 PST
Provides read only access to Amazon Neptune. Note that this policy also grants access to Amazon RDS resources. For more information, see https://aws.amazon.com/neptune/faqs/.
Job function
0
None
2016-11-10 09:31 PST
2020-01-15 16:49 PST
Grants full access permissions to AWS services and actions required to set up and configure AWS network resources.
Job function
0
None
2015-02-06 10:39 PST
2019-03-20 15:19 PST
Provides full access to AWS services and resources, but does not allow management of Users and groups.
AWS managed
0
None
2017-06-12 11:18 PST
2019-10-08 16:53 PST
Policy used by QuickSight team to access customer data produced by S3 Storage Management Analytics.
AWS managed
0
None
2015-02-06 10:41 PST
2019-09-26 15:14 PST
Default policy for the Amazon RDS service role.
AWS managed
0
None
2015-02-06 10:39 PST
2020-02-06 15:35 PST
Provides read-only access to AWS services and resources.
AWS managed
0
None
2015-02-06 10:39 PST
2019-10-02 16:57 PST
Provides full access to Resource Groups and Tag Editor.
AWS managed
0
None
2015-02-06 10:39 PST
2019-03-07 11:43 PST
Provides access to use Resource Groups and Tag Editor, but does not allow editing of tags via the Tag Editor.
AWS managed
0
None
2018-04-04 11:05 PST
2018-05-03 13:02 PST
Provides read/write access to AWS Secrets Manager via the AWS Management Console. Note: this exludes IAM actions, so combine with IAMFullAccess if rotation configuration is required.
Job function
0
None
2015-02-06 10:41 PST
2020-02-25 08:08 PST
The security audit template grants access to read security configuration metadata. It is useful for software that audits the configuration of an AWS account.
AWS managed
0
None
2016-10-24 14:45 PST
2016-10-24 14:45 PST
Permissions to allow the AWS Server Migration Connector to migrate VMs to EC2. Allows communication with the AWS Server Migration Service, read/write access to S3 buckets starting with 'sms-b-' and 'import-to-ec2-' as well as the buckets used for AWS Server Migration Connector upgrade, AWS Server Migration Connector registration with AWS, and metrics upload to AWS.
AWS managed
0
None
2018-11-26 11:53 PST
2018-11-26 11:53 PST
Permissions to allow the AWS Server Migration Service to create and update relevant AWS resources into the customer's AWS account for launching migrated servers and applications.
AWS managed
0
None
2016-10-24 14:19 PST
2019-12-23 15:27 PST
Permissions to allow the AWS Server Migration Service to migrate VMs to EC2: allows the Server Migration Service to place the migrated resources into the customer's EC2 account.
AWS managed
0
None
2019-06-24 08:44 PST
2019-06-24 08:44 PST
Provides full access to Service Quotas
AWS managed
0
None
2019-06-24 08:31 PST
2019-06-24 08:31 PST
Provides read only access to Service Quotas
AWS managed
0
None
2019-05-22 13:44 PST
2019-06-24 07:52 PST
Allows Service Quotas to create support cases on your behalf
AWS managed
0
None
2015-02-06 10:41 PST
2015-02-06 10:41 PST
Provides full access to the Simple Workflow configuration service.
Job function
0
None
2016-11-10 09:21 PST
2017-05-17 16:11 PST
This policy grants permissions to troubleshoot and resolve issues in an AWS account. This policy also enables the user to contact AWS support to create and manage cases.
Job function
0
None
2016-11-10 09:23 PST
2019-06-18 16:13 PST
Grants full access permissions necessary for resources required for application and development operations.
AWS managed
0
None
2018-10-26 13:02 PST
2019-05-10 14:38 PST
TagPolicies Policy to allow Organizations integration.
AWS managed
0
None
2018-11-27 15:36 PST
2020-01-08 13:22 PST
Provides full access to Amazon Translate.
AWS managed
0
None
2017-11-29 10:22 PST
2020-01-08 13:13 PST
Provides read-only access to Amazon Translate.
Job function
0
None
2016-11-10 09:20 PST
2020-01-16 09:42 PST
This policy grants permissions to view resources and basic metadata across all AWS services.
AWS managed
0
None
2015-09-03 13:48 PST
2015-09-03 13:48 PST
Default policy for the VM Import/Export service role, for customers using the AWS Connector. The VM Import/Export service assumes a role with this policy to fulfill virtual machine migration requests from the AWS Connector virtual appliance. (Note that the AWS Connector uses the "AWSConnector" managed policy to issue requests on the customer's behalf to the VM Import/Export service.) Provides the ability to create AMIs and EBS snapshots, modify EBS snapshot attributes, make "Describe*" calls on EC2 objects, and read from S3 buckets starting with 'import-to-ec2-'.
AWS managed
0
None
2018-08-24 14:05 PST
2018-08-24 14:05 PST
Creating SLR to write customer's logs to a firehose stream
AWS managed
0
None
2018-08-24 11:40 PST
2018-08-24 11:40 PST
Creating SLR to write customer's logs to a firehose stream
AWS managed
0
None
2019-11-06 16:40 PST
2019-11-06 16:40 PST
This policy creates a service-linked role that allows AWS WAF to write logs to Amazon Kinesis Data Firehose.
AWS managed
0
None
2018-11-29 10:19 PST
2018-11-29 10:19 PST
Provides full access to AWS Well-Architected Tool via the AWS Management Console
AWS managed
0
None
2018-11-29 10:21 PST
2018-11-29 10:21 PST
Provides read-only access to AWS Well-Architected Tool via the AWS Management Console
AWS managed
0
None
2019-01-23 11:03 PST
2019-01-23 11:03 PST
Enables access to AWS Services and Resources used or managed by Amazon WorkLink
Loading...
No results